If your sensitive data is stolen online, where does it go -- and who sees it? One security team found out.
Staying on top of the latest in software/hardware security research, vulnerabilities, threats and computer attacks.
Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years. He was most recently Editorial Director of BYTE, Dark Reading and Network Computing at UBM Tech. Prior to that he spent over a decade consulting and writing on technology subjects, primarily in the area of security. He is the author of three books and thousands of published articles and many more unpublished, private reports. Larry has been Technical Director at several test laboratories where he both directed and ran product testing, with a special interest in test automation. Larry began his career as a Software Engineer at the now-defunct Desktop Software Corporation in Princeton, NJ, on the team that wrote the NPL 4GL query language. He also worked on corporate IT and software development at Chase Econometrics. Larry is a graduate of the University of Pennsylvania with a degree in Public Policy.
Ms. Violet Blue (tinynibbles.com, @violetblue) is a freelance investigative reporter on hacking and cybercrime at Zero Day/ZDNet, CNET and CBS News, as well as a noted sex columnist. She has made regular appearances on CNN and The Oprah Winfrey Show and is regularly interviewed, quoted, and featured in a variety of publications that includes ABC News and the Wall Street Journal. She has authored and edited award-winning, best selling books in eight translations and has been a sex columnist for the San Francisco Chronicle. She has given keynote talks at such conferences as ETech, LeWeb, and the Forbes Brand Leadership Conference, and has given two Tech Talks at Google. In 2010, the London Times named Blue one of “40 bloggers who really count.” Ms. Blue is the author of The Smart Girl's Guide to Privacy. Violet Blue bio courtesy of TTI Vanguard.
The latest Firefox browser update has created a web encryption security hole for hackers to exploit.
The networking giant has a number of new tricks up its sleeves to tackle the spread of malicious activity, including the long-promised integration of ThreatGrid.
The NSA may not be listening to your private phone calls, but it has been watching your private parts
Tapping into laptop webcams shows the biggest and most blatant lack of respect for people's privacy by Western governments -- probably in living memory.
A new executive order is said to have made it illegal to donate to Edward Snowden's fund, which didn't go down so well with one good-spirited community.
Zero Day Weekly: Cyber national emergency, GitHub and Slack nailed, Android malware less than 1 percent
A collection of notable security news items for the week ending April 3, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.
The Tor router runs on the same hardware as the failed Anonabox project, but with a more "honest" approach. The trouble is: honesty won't keep your Internet activity private.
The code-sharing website is back up and running after a week-long attack crippled its services. The attack was blamed on Beijing, an allegation it didn't actually deny.
The security researcher sadly did not wipe out years of videos by Justin Bieber, leaving the world in the horrid, uncultured state that it is.
The top-of-the-line Blackphones are said to be "NSA-proof," despite the FBI's new policy that demonizes encryption as a "huge problem" for law enforcement.
Symantec says a new Trojan-based campaign, focused on the Middle East, is targeting the energy industry and its trade secrets.
DDoS attacks are not only a disruption but can also cost businesses dearly, according to Neustar research.
Are you getting threat intel -- or just antivirus software? A government-backed report designs a framework for threat intelligence that can be scaled to different sectors, sizes of organization, and organizational goals.
The European agency says tracking and monitoring terrorist suspects is increasingly difficult in a world where encryption is becoming commonplace.
The airline has confirmed thousands of frequent flyer accounts have been accessed.